Solved

Career development courses for Security

Posted on 2016-10-05
9
100 Views
Last Modified: 2016-10-23
Hi All,

i am looking to get more skills and even to a Master in Cyber Security.

Which course you would recommend so i could also use it on my Masters in Cyber Security degree?
0
Comment
Question by:mallony
  • 3
  • 3
  • 2
  • +1
9 Comments
 
LVL 14

Expert Comment

by:SIM50
ID: 41830044
What do you want to do in Security? This field is very broad and ranges from GRC to forensics.
0
 
LVL 62

Expert Comment

by:btan
ID: 41830284
Need experience and go for (ISC)2 CISSP or (ISACA) CISA that will set you in good pace and exposure for cyber security profession. Also SANS courses and degree are another you can check out esp on SANS GIAC certification
Many courses in the program use GIAC certifications as assessments of learning outcomes, and graduates of this degree program acquire more than seven GIAC certifications even before you graduate, including the GIAC Security Expert (GSE) certification, used as a capstone assessment.
https://www.sans.edu/about/faq#q1345
0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 125 total points
ID: 41843446
OSCP is the only course I recommend, you get understanding you never will with CISSP/GSEC and others.
If you know how to use PC's, especially linux, you'll love the course, it's cheap too and includes the test in the price: https://www.offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/
-rich
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 62

Expert Comment

by:btan
ID: 41843488
For hands-on, OSCP is good and CISSP / CISA is more on the professional "buy-in" for your prospective employer and personal career growth in the security community. Actually security conferences run the SANS courses and I do still see SANS course are pretty hands-on too e.g. GCIH, GPEN https://www.sans.org/courses/
0
 
LVL 14

Expert Comment

by:SIM50
ID: 41843542
OP still didn't answer what he wants to do... Your suggestions just cover GRC and red team. What about the rest of the security field?
0
 

Author Comment

by:mallony
ID: 41851902
There is a flow chart with separate fields professional would work and their job position they would hold?
0
 
LVL 62

Assisted Solution

by:btan
btan earned 125 total points
ID: 41851944
Actually you may want to see this framework for cybersecurity training and scope of work, going into each scope of work, it states the KPI and the job. For e.g.

under the "Securely Provision" > "→ Information Assurance Compliance", it has its set of "Knowledge, Skills, and Abilities" (e.g. "Knowledge of IA principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)" etc) listed leading to "Tasks" (e.g. "Develop security compliance processes and/or audits for external services" etc) to perform and the "Related Job Titles" (e.g. Auditor etc)
https://niccs.us-cert.gov/workforce-development/cyber-security-workforce-framework
0
 
LVL 14

Accepted Solution

by:
SIM50 earned 250 total points
ID: 41851990
There is a flow chart with separate fields professional would work and their job position they would hold?

Not a flow chart but I think that's exactly what you are looking for.
https://tisiphone.net/2015/11/08/starting-an-infosec-career-the-megamix-chapters-4-5/
0
 

Author Closing Comment

by:mallony
ID: 41856374
Grea advice!
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The new Gmail Phishing Scam going around is surprising even the savviest of users with its sophisticated techniques.
On Beyond Tools A conversation I recently had with the DevOps manager of a major online retailer really made me think about DevOps monitoring tools (https://www.onpage.com/devops-incident-management-tool/). The manager and I discussed how sever…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question